Sciweavers

607 search results - page 7 / 122
» Managing Constraint Violations in Administrative Information...
Sort
View
64
Voted
WECWIS
2009
IEEE
177views ECommerce» more  WECWIS 2009»
15 years 4 months ago
Business Rules for Concurrent E-commerce Transactions
Business rules are a cornerstone of the consistency management of e-commerce data. The concurrency of transactions by multiple customers of e-commerce services (e.g., seat reserva...
Hendrik Decker
IRI
2007
IEEE
15 years 3 months ago
ARBAC07: A Role-based Administration Model for RBAC with Hybrid Hierarchy
Recently, administration of RBAC systems using rolebased approach has become very appealing because of the benefits that a role-based approach typically brings. This approach uses...
Yue Zhang 0002, James B. D. Joshi
CHIMIT
2009
ACM
15 years 4 months ago
Scripting practices in complex systems management
System administrators are end-users too. And as end-users, they develop tools, create web pages, write command-line scripts, use spreadsheets, and repurpose existing tools. In sho...
Eser Kandogan, Paul P. Maglio, Eben M. Haber, John...
LISA
1994
14 years 10 months ago
The Group Administration Shell and the GASH Network Computing Environment
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exact...
Jonathan Abbey
CONEXT
2009
ACM
14 years 10 months ago
Detecting network neutrality violations with causal inference
We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users, or destinations. Existing systems for detecting ...
Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nic...